- •Які вивчають комп’ютерні науки. Одеський національний політехнічний університет одеса
- •1. Reading
- •2.5. Read these quotations and say which computer essentials they refer to.
- •3.1. Look at the help box and then read the sentences. Fill in the blanks with the correct form of the verbs in brackets.
- •Input devices
- •Video input devices
- •Comprehension check
- •2.1. Decide if these sentences are True or False. If they are false, correct them.
- •2.2. Analyze the text. Which input device would you use for these tasks?
- •2.4. Match the descriptions with the names of keys on the right.
- •3.1. Complete the sentences by using an appropriate –ing form from those in the box.
- •3.2. Match the words in the left part of the box with the appropriate ones in the right. Decide what parts of speech they are.
- •4. Vocabulary
- •4.1. English has the largest vocabulary of all languages. This is partly because there are so many synonyms. Match a word in a with its synonyms in b.
- •Comprehension check
- •Read the text and match each term with the correct definition.
- •2.2. Read and correct these false statements.
- •Complete technical specifications of the monitor with words from the opposite.
- •2.4. Look at the text attentively and answer the questions:
- •Language work
- •3.2. The class of a word can often be changed by adding a suffix. For example, if –er is added to the verb scan (and the 'n' is doubled) we get the noun scanner.
- •Some words have been left out of this persuasive advertisement. Read it and complete it with words from the box.
- •Vocabulary
- •4.1. Make new words with the base words, using the suffixes and/or prefixes. Sometimes you need to make small changes to the spelling.
- •2. Comprehension check
- •2.1. Match the sentence beginnings (1-6) with the correct endings (a-f).
- •2.2. Organize the following stages in the computer data processing into the correct order.
- •2.3. Read this product description and answer the questions below.
- •2.4. Are the following statements true or false? If false, correct the information.
- •2.5. One word is wrong in the following sentences. Underline and correct it.
- •2.6. Answer the questions according to the text.
- •Language work
- •3.1. Look at the help box. Then go to the text in Task 1 and underline the modal verbs.
- •3.2. Complete the sentences using can, could, may, might, should, can’t, must.
- •4. Vocabulary
- •4.1. There are many examples of phrasal verbs. Fill in each of the following sentences with the best phrasal verb.
- •4.2. Read the text, find idiomatic expressions and try to guess their meanings.
- •5. Speaking and Writing.
- •5.2. Rewrite the sentences and fill in the gaps with any suitable words.
- •Reading
- •2. Comprehension check
- •2.1. Choose a term from this word web to complete the sentences below.
- •2.2. Organize the following stages in the drive storing process into the correct order.
- •2.3. Read the text and identify these elements.
- •2.4. Look at the text again and answer the questions:
- •3. Language work
- •3.1. Put the verbs in brackets into the correct form.
- •3.2. Match a line in a with a line in b.
- •2. Comprehension check
- •2.1. Read these quotations and say what types of graphic software they refer to.
- •2.2. Decide if these sentences are True or False. If they are False, correct them.
- •2.3. Look at the text again and answer the questions:
- •3. Language work
- •3.1. Read the hypotheses and complete the reality. Add a sentence.
- •3.2. Fill in the blanks using the verbs in brackets.
- •2. Comprehension check
- •2.1. Are the following statements true or false? If false, correct the information.
- •2.2. Choose a term from this word web to complete the sentences below.
- •Look through the text and try to answer the questions:
- •Language work
- •3.1. Fill in the blanks with the verbs in brackets.
- •3.2. Underline the correct item.
- •4. Vocabulary
- •4.1. Make adjectives with the help of the following suffixes. Translate both the initial word and its derivatives into your native language.
- •4.2. Group the equivalents.
- •Internet connectivity options from end-user to Tier 3/2 isp's.
- •2. Comprehension check
- •2.1. Read and correct these false statements.
- •2.2. Match the sentence beginnings (1-6) with the correct endings (a-f).
- •Look at the text again and answer the questions.
- •Language work
- •3.2. Expand the sentences using future tenses:
- •Vocabulary
- •4.1. Match the terms on the left with the explanations on the right.
- •2. Comprehension check
- •2.1. Are the following statements true or false? Correct the false ones with the right information.
- •2.2. One word is wrong in the following sentences. Underline and correct it.
- •2.3. Answer the questions according to the text.
- •3. Language work
- •3.1. Match the sentence halves in order to make logical sentences:
- •3.2. Using the word in brackets, complete the second sentence so that it has a similar meaning to the first.
- •3.3. Define the function of the Infinitive in the following sentences by putting questions to each of them.
- •4. Vocabulary
- •4.1. Read the sentences and supply the missing letters for each word.
- •4.2. Match the words 1 to 6 to the nouns a) to f) to make word partnerships.
- •Internet security
- •2. Comprehension check
- •2.1. Match the terms with their definitions.
- •2.2. Match the sentence beginnings (1-6) with the correct endings (a-f).
- •2.3. Look at the text again and answer the questions.
- •3. Language work
- •3.1. Use the Past Continuous or Past Simple.
- •3.2. Ask questions to which the underlined words are the answers.
- •3.3. Put as many questions as possible to each of the following sentences:
- •4.Vocabulary.
- •4.1. Group synonyms. One word may have more than one synonym.
- •Supplementary part additional texts for home reading and discussions Computer-aided engineering
- •Internet security
- •Types of security: Network layer security
- •IPsec Protocol
- •Electronic mail security (e-mail)
- •Pretty Good Privacy (pgp)
- •Multipurpose Internet Mail Extensions (mime)
2. Comprehension check
2.1. Match the terms with their definitions.
1. malware a) it perpetrates identity theft in order to access a computer user's online accounts.
2. crimeware b) it facilitates unauthorized access to the user's computer system.
3. trojan horse c) can copy itself and infect a computer without the permission or knowledge of the owner.
4. spyware d) it collects information about users, their computer or browsing habits without their informed consent.
5. worm e) it infiltrates or damages a computer system without the owner's informed consent.
6. computer virus f) it facilitates unauthorized access to the user's computer system.
2.2. Match the sentence beginnings (1-6) with the correct endings (a-f).
1. Crimeware is designed to perpetrate identity theft in order………
2. Spyware is known to change computer settings, resulting in…….
3. Trojan horses are not self-replicating that distinguishes them…...
4. …………….a worm does not need to attach itself to an existing program.
5. Viruses can increase their chances of spreading to other computers by infecting files on a network file system.
6. Internet security involves the protection of a computer's internet account and files from….
a) intrusion of an unknown user.
b) to access a computer user's online accounts.
c) unlike a virus
d) slow connection speeds, different home pages, and loss functionality of other programs.
e) from viruses and worms.
2.3. Look at the text again and answer the questions.
- When is a computer taking a risk?
- What does Internet security involve?
- What does basic security measures involve?
- What is a malware?
- When is the term ‘computer virus’ used?
- What can computer viruses do?
- What is the difference between computer viruses and worms?
- What distinguishes Trojan horses from worms and viruses?
- Where is a spyware installed?
- What is a crimeware designed for?
3. Language work
Help box Past Forms
|
|||
Past Simple |
Past Continuous |
Past Perfect |
Past Perfect Continuous |
past actions which happened one after the other
She sealed the letter, put a stamp on it and posted it. |
action in the middle of happening at stated past time.
He was playing tennis at 4.30 yesterday. |
past action which occurred before another action or before a stated past time
He had left by the time I got there. |
action continuing over a period up to a specific time in the past
She had been working as a clerk for 10 years before she resigned. |
complete action or event which happened at a stated past tim.
She called an hour ago. |
past action in progress interrupted by another past action
While I was getting dressed the bell rang. |
complete past action which had visible results in the past She was sad because she had failed the test. |
past action of certain duration which had visible results in the past
They were wet because they had been working in the rain. |
action which happened at a definite past time although the time is not mentioned
Shakespeare wrote a lot of plays. |
two or more simultaneous past actions
While I was sunbathing, he was swimming. |
the Past Perfect is the past equivalent of the Present Perfect
He couldn’t find his watch. He had lost it. |
the Past Perfect Continuous is the past equivalent of the Present Perfect Continuous
She went to the doctor. Her lag had been aching for two days.
|